{"version":1,"pages":[{"id":"Bqsx0Xx14uOTFAkJvVEj","title":"Documentation","pathname":"/","siteSpaceId":"sitesp_stlJL","description":"Products, Services, User manual, API Docs and more... [r2025-11-25]"},{"id":"100pbzcyNckVPnze2BQ0","title":"Products and Services","pathname":"/products-and-services","siteSpaceId":"sitesp_stlJL","description":"What AquilaX does and offers"},{"id":"aepWhJAM1zrc9R1dKukt","title":"Demo","pathname":"/products-and-services/demo","siteSpaceId":"sitesp_stlJL","description":"See AquilaX in action","breadcrumbs":[{"label":"Products and Services"}]},{"id":"FHnNeYDZZ0zS9KuAjb0L","title":"Security Engineer - Assistant","pathname":"/products-and-services/demo/security-engineer-assistant","siteSpaceId":"sitesp_stlJL","description":"Securitron by AquilaX AI - Findings Review","breadcrumbs":[{"label":"Products and Services"},{"label":"Demo"}]},{"id":"v1sux4PMubm8Le2N4r7A","title":"Security Engineer - Chat","pathname":"/products-and-services/demo/security-engineer-chat","siteSpaceId":"sitesp_stlJL","description":"Securitron by AquilaX AI - ChatBot Assistant","breadcrumbs":[{"label":"Products and Services"},{"label":"Demo"}]},{"id":"e0nKRw6RlqIYmP5qU8y3","title":"Scan code Snippet","pathname":"/products-and-services/demo/scan-code-snippet","siteSpaceId":"sitesp_stlJL","description":"🚨 Scan Your Code Snippets in Seconds with AquilaX!","breadcrumbs":[{"label":"Products and Services"},{"label":"Demo"}]},{"id":"cJVRKNJ5HKZmpOmY6MgB","title":"Product Demo - English","pathname":"/products-and-services/demo/product-demo-english","siteSpaceId":"sitesp_stlJL","description":"AquilaX Security Product Demo in English","breadcrumbs":[{"label":"Products and Services"},{"label":"Demo"}]},{"id":"nSeuzi8sWQ51LUnVXiOs","title":"Product Demo - Italian","pathname":"/products-and-services/demo/product-demo-italian","siteSpaceId":"sitesp_stlJL","description":"AquilaX Security Product Demo in Italian","breadcrumbs":[{"label":"Products and Services"},{"label":"Demo"}]},{"id":"AFYIWWrg6ix7WqpjCPND","title":"Products","pathname":"/products-and-services/products","siteSpaceId":"sitesp_stlJL","description":"Products from AquilaX Platform","breadcrumbs":[{"label":"Products and Services"}]},{"id":"G83LMK10LCYAdEdhuN2V","title":"Services","pathname":"/products-and-services/services","siteSpaceId":"sitesp_stlJL","description":"Services from AquilaX Platform","breadcrumbs":[{"label":"Products and Services"}]},{"id":"a1qJvJbVo0WzjBVjfrP4","title":"Vulnerability Triaging","pathname":"/products-and-services/services/vulnerability-triaging","siteSpaceId":"sitesp_stlJL","description":"We check every vulnerability manually","breadcrumbs":[{"label":"Products and Services"},{"label":"Services"}]},{"id":"X4bMZxBKDTwAY9QjgkDA","title":"AppSec Training","pathname":"/products-and-services/services/appsec-training","siteSpaceId":"sitesp_stlJL","description":"We deliver training tailored to AquilaX and Application Security","breadcrumbs":[{"label":"Products and Services"},{"label":"Services"}]},{"id":"ld9Y3gjjNowrADKB7eet","title":"DevSecOps Consultation","pathname":"/products-and-services/services/devsecops-consultation","siteSpaceId":"sitesp_stlJL","description":"Hands on service to design together the best DevSecOps pipeline","breadcrumbs":[{"label":"Products and Services"},{"label":"Services"}]},{"id":"BYBzWDSWGClwu8F9PVA5","title":"Deployment Options","pathname":"/products-and-services/services/deployment-options","siteSpaceId":"sitesp_stlJL","description":"How to consume AquilaX","breadcrumbs":[{"label":"Products and Services"},{"label":"Services"}]},{"id":"12Zpoml3YEfj4FaF2pFW","title":"Security Consultation","pathname":"/products-and-services/services/security-consultation","siteSpaceId":"sitesp_stlJL","description":"AquilaX Security Consultation Services: Comprehensive Solutions for Your Cybersecurity Needs","breadcrumbs":[{"label":"Products and Services"},{"label":"Services"}]},{"id":"375bHQm2O3SvDhmKUBtX","title":"Integrations","pathname":"/products-and-services/services/integrations","siteSpaceId":"sitesp_stlJL","description":"3rd Party tool integrations","breadcrumbs":[{"label":"Products and Services"},{"label":"Services"}]},{"id":"ioSaoSiu8aE36zHqE33U","title":"Company Principles","pathname":"/products-and-services/company-principles","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"Products and Services"}]},{"id":"YoUs6i3bMRSSYAzDSC45","title":"Engineering Principles","pathname":"/products-and-services/company-principles/engineering-principles","siteSpaceId":"sitesp_stlJL","description":"Engineering Principles Driving AquilaX's Application Security Excellence","breadcrumbs":[{"label":"Products and Services"},{"label":"Company Principles"}]},{"id":"N45JU4Ht7t1remNMkDEa","title":"AI Principles","pathname":"/products-and-services/company-principles/ai-principles","siteSpaceId":"sitesp_stlJL","description":"Core AI Principles at AquilaX: Enhancing Privacy, Security and Usability","breadcrumbs":[{"label":"Products and Services"},{"label":"Company Principles"}]},{"id":"9L0F5fXMwW9aeziQvwJi","title":"AquilaX Mission","pathname":"/products-and-services/company-principles/aquilax-mission","siteSpaceId":"sitesp_stlJL","description":"AquilaX: A Vision Beyond Profit","breadcrumbs":[{"label":"Products and Services"},{"label":"Company Principles"}]},{"id":"Z8mJdrjmySn5bVF6nMm8","title":"Proof of Value (PoV)","pathname":"/products-and-services/proof-of-value-pov","siteSpaceId":"sitesp_stlJL","description":"Tests your organization code base for vulnerabilites","breadcrumbs":[{"label":"Products and Services"}]},{"id":"sLdFV8f2jpGE5aWIX2Vs","title":"SLO/SLA/SLI","pathname":"/products-and-services/slo-sla-sli","siteSpaceId":"sitesp_stlJL","description":"Service Level Objective Agreement and Indicator for AquilaX","breadcrumbs":[{"label":"Products and Services"}]},{"id":"Lqka3copa7HJTD4u2Kcp","title":"Security Scanners","pathname":"/products-and-services/security-scanners","siteSpaceId":"sitesp_stlJL","description":"Scanners used within AquilaX AI","breadcrumbs":[{"label":"Products and Services"}]},{"id":"hXjF8GR9sTVhqeChgxm5","title":"Supported Languages","pathname":"/products-and-services/supported-languages","siteSpaceId":"sitesp_stlJL","description":"What AquilaX can scan and identify security vulnerabilites","breadcrumbs":[{"label":"Products and Services"}]},{"id":"jd1hlgyWV4ojfyYW5x5K","title":"What is AquilaX","pathname":"/products-and-services/what-is-aquilax","siteSpaceId":"sitesp_stlJL","description":"AquilaX: Next-Generation AI-Powered Application Security","breadcrumbs":[{"label":"Products and Services"}]},{"id":"CqAFuwKRZwAf8FgC0mat","title":"Success Cases","pathname":"/products-and-services/success-cases","siteSpaceId":"sitesp_stlJL","description":"How AquilaX have help software houses to secure their software","breadcrumbs":[{"label":"Products and Services"}]},{"id":"qI8C6X83p98SHurNrc5s","title":"RemoteEngine","pathname":"/products-and-services/success-cases/remoteengine","siteSpaceId":"sitesp_stlJL","description":"Case Study: Enhancing Security with AquilaX at RemoteEngine.","breadcrumbs":[{"label":"Products and Services"},{"label":"Success Cases"}]},{"id":"Bb1j4WBR9whLzKw4gxB3","title":"Almotech: Fast-Track to Secure Software","pathname":"/products-and-services/success-cases/almotech-fast-track-to-secure-software","siteSpaceId":"sitesp_stlJL","description":"Discover key metrics, practical results, and the next steps Almotech is taking to reach zero critical vulnerabilities and full coverage for every release — all without slowing down engineering.","breadcrumbs":[{"label":"Products and Services"},{"label":"Success Cases"}]},{"id":"a9bxgjEKS9Vzapb6zsNK","title":"AquilaX License Model","pathname":"/products-and-services/aquilax-license-model","siteSpaceId":"sitesp_stlJL","description":"AquilaX offers three subscription tiers—Free, Premium, and Ultimate—designed to scale with your security needs.","breadcrumbs":[{"label":"Products and Services"}]},{"id":"f55hbhCmGyHT6cBFsTQW","title":"Compliance Report","pathname":"/products-and-services/compliance-report","siteSpaceId":"sitesp_stlJL","description":"AquilaX Consolidated Security Reporting","breadcrumbs":[{"label":"Products and Services"}]},{"id":"K5RzVJQnuj15mHKrxS9z","title":"Security Rating","pathname":"/products-and-services/security-rating","siteSpaceId":"sitesp_stlJL","description":"Security Rating Score for AppSec Scan","breadcrumbs":[{"label":"Products and Services"}]},{"id":"UEW2oaao7593W7sFKGmJ","title":"Integrations","pathname":"/products-and-services/integrations","siteSpaceId":"sitesp_stlJL","description":"List of Integrations covered in AquilaX","breadcrumbs":[{"label":"Products and Services"}]},{"id":"KCvaMsjoYifw7LnnWzfI","title":"Cloud Security Posture Managment","pathname":"/products-and-services/cloud-security-posture-managment","siteSpaceId":"sitesp_stlJL","description":"AquilaX Cloud Security Posture Management (CSPM)","breadcrumbs":[{"label":"Products and Services"}]},{"id":"IHB8T5WMkX1JTumo7rpB","title":"User Manual","pathname":"/user-manual","siteSpaceId":"sitesp_stlJL","description":""},{"id":"edYadKbVfxLYzNQrpNB1","title":"Access Tokens","pathname":"/user-manual/access-tokens","siteSpaceId":"sitesp_stlJL","description":"How to create a Personal Access Token (PAT)","breadcrumbs":[{"label":"User Manual"}]},{"id":"FVa80cepE6WstfZaPj78","title":"Scanners","pathname":"/user-manual/scanners","siteSpaceId":"sitesp_stlJL","description":"AquilaX Ultimate is a comprehensive software security scanner, designed to detect a wide range of security vulnerabilities in the source code of any application.","breadcrumbs":[{"label":"User Manual"}]},{"id":"giPMJHCVPObR96kRk6E5","title":"Secret Scanning","pathname":"/user-manual/scanners/secret-scanning","siteSpaceId":"sitesp_stlJL","description":"Protect Your Code from Leaked Secrets","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"PG3wv1QR2ufN6S2g3hZ2","title":"PII Scanner","pathname":"/user-manual/scanners/pii-scanner","siteSpaceId":"sitesp_stlJL","description":"Safeguarding Personally Identifiable Information","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"D0ebr2oMZxTM9cKZYT2v","title":"SAST","pathname":"/user-manual/scanners/sast","siteSpaceId":"sitesp_stlJL","description":"Secure Code with Static Application Security Testing","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"U73TxRT9BCYW8vCk8t64","title":"SCA","pathname":"/user-manual/scanners/sca","siteSpaceId":"sitesp_stlJL","description":"Keep Track of Vulnerable Dependencies with Software Composition Analysis","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"jkUB9Yb84rfjE0Vk1ZBn","title":"Container Scanning","pathname":"/user-manual/scanners/container-scanning","siteSpaceId":"sitesp_stlJL","description":"Secure Your Containers from Vulnerabilities","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"ny2MuXXAoAeDntVWOyqF","title":"IaC Scanning","pathname":"/user-manual/scanners/iac-scanning","siteSpaceId":"sitesp_stlJL","description":"Infrastructure-as-Code Security for Modern DevOps","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"u7iLCs7LBTF4f1OPGxrU","title":"API Security","pathname":"/user-manual/scanners/api-security","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"IVJ1dF7Lvlr00Bjpded4","title":"Malware Scanning","pathname":"/user-manual/scanners/malware-scanning","siteSpaceId":"sitesp_stlJL","description":"Protect Your Code from Malicious Software","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"jf7K3J7N9rzKwDFKU5x6","title":"AI Generated Code","pathname":"/user-manual/scanners/ai-generated-code","siteSpaceId":"sitesp_stlJL","description":"Scanning for AI Generated Code","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"Scf4kKVLXrk8Gejq1lhe","title":"License Scanning","pathname":"/user-manual/scanners/license-scanning","siteSpaceId":"sitesp_stlJL","description":"AquilaX License Scanning Compliance Process","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"P3i561R3ZZUaymyb3co1","title":"Dynamic Scan - DAST","pathname":"/user-manual/scanners/dynamic-scan-dast","siteSpaceId":"sitesp_stlJL","description":"AquilaX DAST Integration via Vulnix0 — Technical Documentation","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"}]},{"id":"Mt1hViayk7PjDphEfdRc","title":"How to start a DAST Scan","pathname":"/user-manual/scanners/dynamic-scan-dast/how-to-start-a-dast-scan","siteSpaceId":"sitesp_stlJL","description":"Step by Step guide how to start a Dynamic scan within AquilaX","breadcrumbs":[{"label":"User Manual"},{"label":"Scanners"},{"label":"Dynamic Scan - DAST"}]},{"id":"noqR2vd7fFd3RLptcN3w","title":"DevTools","pathname":"/user-manual/devtools","siteSpaceId":"sitesp_stlJL","description":"Ways to use AquilaX","breadcrumbs":[{"label":"User Manual"}]},{"id":"OlaME0BX8zBiv8P6dGDo","title":"AquilaX CLI","pathname":"/user-manual/devtools/aquilax-cli","siteSpaceId":"sitesp_stlJL","description":"AquilaX CLI is a command-line interface for the AquilaX Application Security Platform","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"}]},{"id":"cHDyy5m8WQkRP2RE06KK","title":"CI/CD","pathname":"/user-manual/devtools/ci-cd","siteSpaceId":"sitesp_stlJL","description":"Integrate AquilaX within your CICD pipeline","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"}]},{"id":"JCyIHAIT9HlctvcFcpHT","title":"GitHub Integration","pathname":"/user-manual/devtools/ci-cd/github-integration","siteSpaceId":"sitesp_stlJL","description":"How to scan your code with AquilaX with GitHub Action","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"},{"label":"CI/CD"}]},{"id":"tRyvv1U1ZHaBhIXVRyKP","title":"GitLab Integration","pathname":"/user-manual/devtools/ci-cd/gitlab-integration","siteSpaceId":"sitesp_stlJL","description":"How to scan your code with AquilaX with GitLab Jobs","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"},{"label":"CI/CD"}]},{"id":"ks0sjFOK8WAdLsQj1UPv","title":"Azure DevOps Integration","pathname":"/user-manual/devtools/ci-cd/azure-devops-integration","siteSpaceId":"sitesp_stlJL","description":"Integrate AquilaX security scanning into your Azure DevOps CI/CD pipelines to automatically detect vulnerabilities, security issues, and compliance violations in your codebase.","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"},{"label":"CI/CD"}]},{"id":"PpjlnMRpzw6DS6aMR3ge","title":"Vulnerability Tickets","pathname":"/user-manual/devtools/vulnerability-tickets","siteSpaceId":"sitesp_stlJL","description":"How to raise vulnerabilities into internal VM platform","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"}]},{"id":"5f8FZuePsj2oGa4jZtZK","title":"GitHub Issues","pathname":"/user-manual/devtools/vulnerability-tickets/github-issues","siteSpaceId":"sitesp_stlJL","description":"How to raise a GitHub issue for a finding from AquilaX","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"},{"label":"Vulnerability Tickets"}]},{"id":"jCbsrq0L69eZfIKyuReK","title":"GitLab Issues","pathname":"/user-manual/devtools/vulnerability-tickets/gitlab-issues","siteSpaceId":"sitesp_stlJL","description":"How to raise a GitLab issue for a finding from AquilaX","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"},{"label":"Vulnerability Tickets"}]},{"id":"LPtn5rXm6CgwR0WtT5C4","title":"JIRA Tickets","pathname":"/user-manual/devtools/vulnerability-tickets/jira-tickets","siteSpaceId":"sitesp_stlJL","description":"How to raise a JIRA ticket for a finding from AquilaX","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"},{"label":"Vulnerability Tickets"}]},{"id":"GJFwn9dkzSjBKkEvthNT","title":"IDE","pathname":"/user-manual/devtools/ide","siteSpaceId":"sitesp_stlJL","description":"Integrated Development Environment plugin for AquilaX","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"}]},{"id":"4tbqmHWTfRB6wHIeyJ5R","title":"VS Code","pathname":"/user-manual/devtools/ide/vs-code","siteSpaceId":"sitesp_stlJL","description":"AquilaX AppSec VS Code Extension - Installation and Usage Guide","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"},{"label":"IDE"}]},{"id":"X7kIwwooqNQDarJQbSI4","title":"IntelliJ","pathname":"/user-manual/devtools/ide/intellij","siteSpaceId":"sitesp_stlJL","description":"AquilaX AppSec IntelliJ IDEA Plugin Documentation","breadcrumbs":[{"label":"User Manual"},{"label":"DevTools"},{"label":"IDE"}]},{"id":"lGM88RHfoOXPhaR6MlGY","title":"Frameworks","pathname":"/user-manual/frameworks","siteSpaceId":"sitesp_stlJL","description":"Scanning Functionalities supported by AquilaX","breadcrumbs":[{"label":"User Manual"}]},{"id":"vUkRIF3Hj6zWfLErB1fa","title":"Roles","pathname":"/user-manual/roles","siteSpaceId":"sitesp_stlJL","description":"AquilaX platform is using access roles and grouping by organization in order to authorize and control every API request","breadcrumbs":[{"label":"User Manual"}]},{"id":"bnf4oJXD5DgSd25cR5DB","title":"Security Policy","pathname":"/user-manual/security-policy","siteSpaceId":"sitesp_stlJL","description":"Security policy is a configuration in JSON format, that is attached to a group, in order to `instruct` how AquilaX scanner and engine needs to behave.","breadcrumbs":[{"label":"User Manual"}]},{"id":"4JEg5ys9RIfCze8nnkJd","title":"Custom Security Policy","pathname":"/user-manual/security-policy/custom-security-policy","siteSpaceId":"sitesp_stlJL","description":"This release introduces scan-level custom security policies, allowing users to override group-level security configurations on a per-scan basis.","breadcrumbs":[{"label":"User Manual"},{"label":"Security Policy"}]},{"id":"TKG5frBlvEFyWhaUiUz1","title":"Comparison","pathname":"/user-manual/comparison","siteSpaceId":"sitesp_stlJL","description":"AquilaX vs other AppSec Product in the market","breadcrumbs":[{"label":"User Manual"}]},{"id":"slZP3m0E1qsa3SOQGEJH","title":"ArmorCode vs AquilaX","pathname":"/user-manual/comparison/armorcode-vs-aquilax","siteSpaceId":"sitesp_stlJL","description":"Differences and similarities between ArmorCode and AquilaX","breadcrumbs":[{"label":"User Manual"},{"label":"Comparison"}]},{"id":"cKoUa4p8dRbHKWHhPFoo","title":"Black Duck vs AquilaX","pathname":"/user-manual/comparison/black-duck-vs-aquilax","siteSpaceId":"sitesp_stlJL","description":"Differences and similarities between BlackDuck and AquilaX","breadcrumbs":[{"label":"User Manual"},{"label":"Comparison"}]},{"id":"I9byRmIYK5lm8efyoK5P","title":"AquilaX vs other Vendors","pathname":"/user-manual/comparison/aquilax-vs-other-vendors","siteSpaceId":"sitesp_stlJL","description":"AquilaX vs Traditional Security Vendors: The Future of DevSecOps","breadcrumbs":[{"label":"User Manual"},{"label":"Comparison"}]},{"id":"5vC7Pg90cXOI5kLpxgMe","title":"Press and Logo","pathname":"/user-manual/press-and-logo","siteSpaceId":"sitesp_stlJL","description":"AquilaX logo and brand assets","breadcrumbs":[{"label":"User Manual"}]},{"id":"50MwsFnWAZPiB0I0a7mr","title":"Install AquilaX","pathname":"/user-manual/install-aquilax","siteSpaceId":"sitesp_stlJL","description":"How to prepare and install AquilaX On-Prem / Cloud or your VM","breadcrumbs":[{"label":"User Manual"}]},{"id":"p4yrMH4SrD0OdO1NHKBz","title":"Public Scan","pathname":"/user-manual/public-scan","siteSpaceId":"sitesp_stlJL","description":"Scan your open source code for free","breadcrumbs":[{"label":"User Manual"}]},{"id":"ti2l7bSbfenKA5YKJtyd","title":"Scanning Setup Guide","pathname":"/user-manual/scanning-setup-guide","siteSpaceId":"sitesp_stlJL","description":"Setting Up AquilaX Scanning and Groups: A Guide","breadcrumbs":[{"label":"User Manual"}]},{"id":"7vdwxmCwrb52KzzxUzJH","title":"AI Chat Prompts","pathname":"/user-manual/ai-chat-prompts","siteSpaceId":"sitesp_stlJL","description":"How to interact with AquilaX ChatBot","breadcrumbs":[{"label":"User Manual"}]},{"id":"c4atimdF4blX5mhXdK4J","title":"Connect AquilaX with Git","pathname":"/user-manual/connect-aquilax-with-git","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"User Manual"}]},{"id":"PzKjtzP94obxFfasFON2","title":"GitLab Connection","pathname":"/user-manual/connect-aquilax-with-git/gitlab-connection","siteSpaceId":"sitesp_stlJL","description":"Connecting AquilaX to Your Private GitLab Repositories","breadcrumbs":[{"label":"User Manual"},{"label":"Connect AquilaX with Git"}]},{"id":"6PaYDgspMWn2HxKfgZpt","title":"GitHub Connection","pathname":"/user-manual/connect-aquilax-with-git/github-connection","siteSpaceId":"sitesp_stlJL","description":"Connecting AquilaX to Your Private GitHub Repositories","breadcrumbs":[{"label":"User Manual"},{"label":"Connect AquilaX with Git"}]},{"id":"AZc3WE7qxbpiu3fGuZtE","title":"API Docs","pathname":"/api-docs","siteSpaceId":"sitesp_stlJL","description":"API Documentation"},{"id":"ZfUlpWXXTAbHg87NLocR","title":"Tech Articles","pathname":"/blog","siteSpaceId":"sitesp_stlJL","description":""},{"id":"yI8CxY71bLE6aW2biVXa","title":"Proprietary AI Models","pathname":"/blog/proprietary-ai-models","siteSpaceId":"sitesp_stlJL","description":"ML and AI Models of AquilaX","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"ogxaajd2MDDfhJqSKdOJ","title":"AquilaX Securitron","pathname":"/blog/aquilax-securitron","siteSpaceId":"sitesp_stlJL","description":"AquilaX's flagship AI Model","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"lHLIPcdYbqAitS96Az5q","title":"Securitron AI Service","pathname":"/blog/securitron-ai-service","siteSpaceId":"sitesp_stlJL","description":"Functionalities of AquilaX's AI Engine","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"hKR72KwDUVGPjOmBLKjf","title":"Secure SDLC (DevSecOps)","pathname":"/blog/secure-sdlc-devsecops","siteSpaceId":"sitesp_stlJL","description":"Secure your application via SDLC","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"Ynn3ZiG2zK5Boulx0UZI","title":"Bending the technology","pathname":"/blog/bending-the-technology","siteSpaceId":"sitesp_stlJL","description":"Serving you customers","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"a0jcvZxykhvVUaHFrG3v","title":"SecuriTron In Action","pathname":"/blog/securitron-in-action","siteSpaceId":"sitesp_stlJL","description":"AI Security Assistan","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"naauZIXLP6qvPlNS7XAP","title":"Future","pathname":"/blog/tech-articles","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"GoUL4Elt1igezeZMjo9c","title":"The Future of Code Review","pathname":"/blog/tech-articles/the-future-of-code-review","siteSpaceId":"sitesp_stlJL","description":"AquilaX to surpass traditional Code Review","breadcrumbs":[{"label":"Tech Articles"},{"label":"Future"}]},{"id":"3H5EroEcGsV8Glxs8NKO","title":"Building Superhumans","pathname":"/blog/tech-articles/building-superhumans","siteSpaceId":"sitesp_stlJL","description":"Software Security Revolution","breadcrumbs":[{"label":"Tech Articles"},{"label":"Future"}]},{"id":"41K5luWZMSPcIYSRRG6A","title":"Blog","pathname":"/blog/blog","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"Uvz6mBFhOE3xcg9Zcf2h","title":"Breaking the Code: AquilaX","pathname":"/blog/blog/breaking-the-code-aquilax","siteSpaceId":"sitesp_stlJL","description":"An AquilaX Opinion","breadcrumbs":[{"label":"Tech Articles"},{"label":"Blog"}]},{"id":"2bNEXKYM2R1DwsoVaEfm","title":"Rethinking Authentication in 2024","pathname":"/blog/blog/rethinking-authentication-in-2024","siteSpaceId":"sitesp_stlJL","description":"An AquilaX Opinion","breadcrumbs":[{"label":"Tech Articles"},{"label":"Blog"}]},{"id":"DC7FC9ooBkFPbjB5YEUS","title":"Software Supply Chain Security","pathname":"/blog/blog/software-supply-chain-security","siteSpaceId":"sitesp_stlJL","description":"An AquilaX Opinion","breadcrumbs":[{"label":"Tech Articles"},{"label":"Blog"}]},{"id":"xKD23p7eFKSoFF0QMBtL","title":"OneFirewall - Network Security","pathname":"/blog/blog/onefirewall-network-security","siteSpaceId":"sitesp_stlJL","description":"Enhancing Data Center Security: The Technical Impact of AquilaX's Partnership with OneFirewall","breadcrumbs":[{"label":"Tech Articles"},{"label":"Blog"}]},{"id":"CaMUDSXNXS9E6PgPUomr","title":"The Art of Doing Source Code Review","pathname":"/blog/blog/the-art-of-doing-source-code-review","siteSpaceId":"sitesp_stlJL","description":"Practical Guide","breadcrumbs":[{"label":"Tech Articles"},{"label":"Blog"}]},{"id":"N9ZnG9U4asSBhPwbl5UK","title":"Our Cloud Infrastracture","pathname":"/blog/blog/our-cloud-infrastracture","siteSpaceId":"sitesp_stlJL","description":"How AquilaX is deployed on multi-cloud","breadcrumbs":[{"label":"Tech Articles"},{"label":"Blog"}]},{"id":"KLsepXpABEtKQJCylyMI","title":"AppSec","pathname":"/blog/appsec","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"aGYZcuKLmtMDyiQpBIbV","title":"10 ‘must’ controls","pathname":"/blog/appsec/10-must-controls-for-modern-appsec","siteSpaceId":"sitesp_stlJL","description":"10 ‘must’ controls for modern AppSec","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"wloSENIhNodY3faeNqpY","title":"OWASP Top 10","pathname":"/blog/appsec/owasp-top-ten-security-risks","siteSpaceId":"sitesp_stlJL","description":"Understanding and Mitigating Common Vulnerabilities","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"mSc9PgoqOfqrQVPCUaXs","title":"MITRE ATT&CK Framework","pathname":"/blog/appsec/mitre-att-and-ck-framework","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"ulHsj8MP4FYziROafgzp","title":"SQL Injection","pathname":"/blog/appsec/sql-injection-techniques-and-mitigations","siteSpaceId":"sitesp_stlJL","description":"Techniques and Mitigations","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"H7avHMyOA9LsjUJFLdWY","title":"DevSecOps","pathname":"/blog/appsec/devsecops-integrating-security-into-the-devops-lifecycle","siteSpaceId":"sitesp_stlJL","description":"Integrating Security into the DevOps Lifecycle","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"mRhCS4f4Ss4RgRmfOrnb","title":"Insider Threats in Application Security","pathname":"/blog/appsec/mitigating-insider-threats-in-application-security","siteSpaceId":"sitesp_stlJL","description":"Mitigating Insider Threats in Application Security","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"NzaMo4mkp5bulyyJKqNF","title":"Secure API Development","pathname":"/blog/appsec/secure-api-development-best-practices-and-guidelines","siteSpaceId":"sitesp_stlJL","description":"Best Practices and Guidelines","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"qLDSwnHE5Sict5VTEPsK","title":"RBAC in Applications","pathname":"/blog/appsec/implementing-role-based-access-control-rbac-in-applications","siteSpaceId":"sitesp_stlJL","description":"Implementing Role-Based Access Control (RBAC) in Applications","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"EIOnjHsSjLXWxxQQsASE","title":"Security in CI/CD Pipelines","pathname":"/blog/appsec/security-in-ci-cd-pipelines","siteSpaceId":"sitesp_stlJL","description":"Implementing Security in CI/CD Pipelines","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"4LmrMZeFI9thydFe6nrc","title":"Audits in DevSecOps","pathname":"/blog/appsec/audits-in-devsecops","siteSpaceId":"sitesp_stlJL","description":"Automating Security Audits in DevSecOps","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"HBxbw9F4MRxkdHjN2I7U","title":"Security Policies","pathname":"/blog/appsec/security-policies","siteSpaceId":"sitesp_stlJL","description":"Security Policies in Application Security","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"FcsA7Yn30xRJPp1SH1Q7","title":"S SDLC","pathname":"/blog/appsec/s-sdlc","siteSpaceId":"sitesp_stlJL","description":"Secure Software Development Lifecycle (SDLC)","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"K0zJCoSzrCmdHo3NSMe7","title":"Multi-Factor Authentication (MFA)","pathname":"/blog/appsec/multi-factor-authentication-mfa","siteSpaceId":"sitesp_stlJL","description":"Understanding Multi-Factor Authentication (MFA): Enhancing Security in Application Access","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"8rkkb4Tm2eK9WR1D5bBm","title":"API Gateway Security","pathname":"/blog/appsec/api-gateway-security","siteSpaceId":"sitesp_stlJL","description":"Implementing API Gateway Security Best Practices","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"IBmu5LKrW2nw6NuS1WpM","title":"RESTful APIs","pathname":"/blog/appsec/restful-apis","siteSpaceId":"sitesp_stlJL","description":"Securing RESTful APIs: Best Practices and Techniques","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"tGpKa9VPwM7iFEKTOlUg","title":"Microservices","pathname":"/blog/appsec/microservices","siteSpaceId":"sitesp_stlJL","description":"Securing Microservices Architecture","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"hwR2vtOYJZorYos81NaW","title":"Secure API Development","pathname":"/blog/appsec/secure-api-development-1","siteSpaceId":"sitesp_stlJL","description":"Best Practices and Guidelines","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"rrbUnAc7u7jzYNcmnhtb","title":"API Security Best Practices","pathname":"/blog/appsec/api-security-best-practices","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"Tech Articles"},{"label":"AppSec"}]},{"id":"woCDx3EUtFGqaOtnHdcj","title":"AI","pathname":"/blog/ai","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"ibMxaOC6JFY6LgGP1lma","title":"AI part of AppSec","pathname":"/blog/ai/ai-part-of-appsec","siteSpaceId":"sitesp_stlJL","description":"Enhancing Software Security Scanning with AI and Machine Learning: AquilaX’s Approach","breadcrumbs":[{"label":"Tech Articles"},{"label":"AI"}]},{"id":"mwMWqhUb9xOl6CKZyQCJ","title":"NL-JSON Model","pathname":"/blog/ai/nl-json-model","siteSpaceId":"sitesp_stlJL","description":"The NL-JSON model is designed to simplify the interaction between users and complex systems by translating natural language commands into structured JSON format.","breadcrumbs":[{"label":"Tech Articles"},{"label":"AI"}]},{"id":"keTyIZW8RYE8p1JJnyMy","title":"Findings Review (AquilaX AI)","pathname":"/blog/ai/findings-review-aquilax-ai","siteSpaceId":"sitesp_stlJL","description":"How AquilaX is capable to predict if any finding is False Positive or True Positive","breadcrumbs":[{"label":"Tech Articles"},{"label":"AI"}]},{"id":"Sx7zTrTLPYRn1fO8IYa0","title":"AI-Driven Vulnerability Triage","pathname":"/blog/ai/ai-driven-vulnerability-triage","siteSpaceId":"sitesp_stlJL","description":"AI-Driven Vulnerability Triage: The AquilaX Approach","breadcrumbs":[{"label":"Tech Articles"},{"label":"AI"}]},{"id":"vXJEXQHj6PJm7741Qh6f","title":"SAST and AI Intersection","pathname":"/blog/ai/sast-and-ai-intersection","siteSpaceId":"sitesp_stlJL","description":"How we use SLM with SAST","breadcrumbs":[{"label":"Tech Articles"},{"label":"AI"}]},{"id":"EBPO4l9LNkLGBn6PHXq2","title":"Tech Events","pathname":"/blog/tech-events","siteSpaceId":"sitesp_stlJL","description":"Where AquilaX have been present","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"ZyFSLxxajuuVMNca0MvC","title":"Web Summit 2024","pathname":"/blog/tech-events/web-summit-2024","siteSpaceId":"sitesp_stlJL","description":"AquilaX.AI Recognized as Leading Application Security Startup at Web Summit 2024","breadcrumbs":[{"label":"Tech Articles"},{"label":"Tech Events"}]},{"id":"sWagvxJJtigzAobd9b8m","title":"ASPM","pathname":"/blog/aspm","siteSpaceId":"sitesp_stlJL","description":"Application Security Posture Management - Breaking Down the Buzzword","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"AGL3xtqDHA6nrcBRiMJ7","title":"State of Art Secure SDLC","pathname":"/blog/state-of-art-secure-sdlc","siteSpaceId":"sitesp_stlJL","description":"Building a State-of-the-Art Secure SDLC: A Practical Guide","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"y89fiISJfosblflJahJt","title":"Validating Runtime Security","pathname":"/blog/state-of-art-secure-sdlc/validating-runtime-security","siteSpaceId":"sitesp_stlJL","description":"Dynamic Application Security Testing (DAST): Validating Runtime Security","breadcrumbs":[{"label":"Tech Articles"},{"label":"State of Art Secure SDLC"}]},{"id":"jWDftHHDFWWSitFNoQAt","title":"Announcements","pathname":"/blog/announcements","siteSpaceId":"sitesp_stlJL","description":"What’s Happening in the AquilaX Community?","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"8gctqrnQZzJ2xIOdDwbR","title":"10 Billion","pathname":"/blog/announcements/10-billion","siteSpaceId":"sitesp_stlJL","description":"10 Billions Lines of Code Scanned","breadcrumbs":[{"label":"Tech Articles"},{"label":"Announcements"}]},{"id":"9EsV3ZBq5F1Gm2pvrvxZ","title":"AquilaX Joins NVIDIA Inception","pathname":"/blog/announcements/aquilax-joins-nvidia-inception","siteSpaceId":"sitesp_stlJL","description":"AquilaX has joined NVIDIA Inception, a program that nurtures startups revolutionizing industries with technological advancements.","breadcrumbs":[{"label":"Tech Articles"},{"label":"Announcements"}]},{"id":"XGwlch9egd08ecmKMitw","title":"AquilaX and Digitense SRL","pathname":"/blog/announcements/aquilax-and-digitense-srl","siteSpaceId":"sitesp_stlJL","description":"AquilaX AI and Digitense SRL Formalize Strategic Engagement to Support Secure Software Development Across Europe","breadcrumbs":[{"label":"Tech Articles"},{"label":"Announcements"}]},{"id":"RIVWCG4xsOgULqNxQXAT","title":"AquilaX and CyberPip","pathname":"/blog/announcements/aquilax-and-cyberpip","siteSpaceId":"sitesp_stlJL","description":"AquilaX x CyberPip: Joining Forces to Bring Practical Security to Startups and Scaleups","breadcrumbs":[{"label":"Tech Articles"},{"label":"Announcements"}]},{"id":"E2O8h74bA9PhTZE9bvV0","title":"Webinars","pathname":"/blog/webinars","siteSpaceId":"sitesp_stlJL","description":"","breadcrumbs":[{"label":"Tech Articles"}]},{"id":"uxqVZSBVydm7cmdlkbVr","title":"Unlock the Future of Code Security with AI","pathname":"/blog/webinars/unlock-the-future-of-code-security-with-ai","siteSpaceId":"sitesp_stlJL","description":"Webinar on how AI is transforming application security for software engineers.","breadcrumbs":[{"label":"Tech Articles"},{"label":"Webinars"}]},{"id":"b22wOmds9yVyieUzdopA","title":"AI Models","pathname":"/ai-models","siteSpaceId":"sitesp_stlJL","description":"AI Models - Architecture @ AquilaX Ecosystem"},{"id":"8L3YuIiVumnej640X7CP","title":"AI Scanner","pathname":"/ai-models/ai-scanner","siteSpaceId":"sitesp_stlJL","description":"AI-Powered Vulnerability Detection Model","breadcrumbs":[{"label":"AI Models"}]},{"id":"2EJ7JigeeZqz291DxmVr","title":"Query","pathname":"/ai-models/query","siteSpaceId":"sitesp_stlJL","description":"Query databases in plain English","breadcrumbs":[{"label":"AI Models"}]},{"id":"6DCiYZ8wJ86gI1PmNZ4N","title":"QnA","pathname":"/ai-models/qna","siteSpaceId":"sitesp_stlJL","description":"AquilaX QnA (Securitron)","breadcrumbs":[{"label":"AI Models"}]},{"id":"gsvF09aKKL4Lgr11Bb0D","title":"Security Assistant","pathname":"/ai-models/security-assistant","siteSpaceId":"sitesp_stlJL","description":"AI model designed to simplify the identification and remediation of security vulnerabilities within codebases","breadcrumbs":[{"label":"AI Models"}]},{"id":"7xxfbjF0T7u9FNbneqWA","title":"Review","pathname":"/ai-models/review","siteSpaceId":"sitesp_stlJL","description":"Findings Review Model that significantly reduces noise and improves the accuracy of static analysis","breadcrumbs":[{"label":"AI Models"}]}]}